Bialomazur / Brutus
Botnet targeting Windows machines π
β44Updated 4 years ago
Alternatives and similar repositories for Brutus
Users that are interested in Brutus are comparing it to the libraries listed below
Sorting:
- Mini Wordress Exploiter using CVE2020β31Updated 4 years ago
- detect trojans in an easy way π‘οΈβ29Updated 6 years ago
- Hacking Tools Z0172CKβ31Updated last year
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.β27Updated 5 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalitiesβ48Updated last year
- Jok3r - Network and Web Pentest Frameworkβ17Updated 6 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 4 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Paramβ¦β40Updated last year
- Simple but sharp ransomwareβ35Updated 4 years ago
- β15Updated 3 years ago
- Cve and Exploit Finder on the targetβ25Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β40Updated 4 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 wavesβ63Updated 5 years ago
- chrome keylogger extension !!!β18Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idkβ53Updated 3 years ago
- β17Updated 5 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardwareβ¦β45Updated last year
- Keylogger using pynput + mail senderβ54Updated 4 years ago
- Face-recognition using python 2+ opencvβ7Updated 7 years ago
- Python RAT with reverse connection and asymmetric encrypted communicationsβ16Updated 4 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in Nβ¦β30Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Updated 3 years ago
- An encrypted notebookβ33Updated 2 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β62Updated 5 years ago
- Devploit v 1.1 Information Gathering Toolβ32Updated 7 years ago
- Tool to brute website sub-domains and dirs.β47Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Pythonβ54Updated 4 years ago
- (Windows/Linux/Mac) Remote Administration Toolβ64Updated 4 years ago
- β9Updated 4 years ago
- pure python remote adb scanner + nmap scan moduleβ21Updated 6 years ago